Initiated by the Financial Institution Flashcards

1
Q

Investigations may be initiated?

A

from proactive monitoring for potentially suspicious activity & reactive measures taken to address regulatory findings, referrals or other recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the Common initiators to investigation

A

1) Regulatory recommendations
2) Official Findings
3) Referrals from customer-facing employees
4) Negative media information
5) Search warrant
6) Govt Subpoena
potentially suspicious activity detected from Transaction monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why should FI initiate (do) TRANSACTION MONITORING

A

to regularly monitor transactions

to proactively identify potentially suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the common approaches for TM?

A

1 creation of in-house Team
2 customizable transaction monitoring rules
3 Third Party Vendor can be engaged to assist with the development and implementation of automated rules
4 use a risk-based approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is included in common Approaches for TM

A

1 creation of in-house Team
2 customisation transaction monitoring rules
3 Third Party Vendor can be engaged to assist with the development and implementation of automated rules
4 use a risk-based approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is included in the Tuning Pratices for TM

A

1) evaluating the output of monitoring rules
2) to determine whether rule adjustments are necessary conduct above and below-the-line testing and examine specific thresholds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Elaborate Wolfsberg Group 2009 Statement on Monitoring, Screening and Searching

A

An institution’s transaction monitoring framework should be aligned to the risk of its business model,
the products and services offered, and its customer base. The same should be embedded in an institution’s
AML program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Elaborate Wolfsberg Group 2009 Statement on Monitoring, Screening and Searching

A

An institution’s transaction monitoring framework should be aligned to the risk of its business model,
the products and services offered, and its customer base. The same should be embedded in an institution’s
AML program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What additional points are discussed in Wolfsberg Group 2009 Statement on Monitoring, Screening and Searching

A

The document additionally discusses types of monitoring, typology reviews, and
staff training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should be considered during designing transaction monitoring rules

A

size of the institution,

products offered, and the features of those products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Financial institutions should

use a _____________to transaction monitoring

A

Risk-based approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Tuning Practice

A

evaluating the output
of monitoring rules, examining specific thresholds and conducting above and below-the-line testing
to determine whether rule adjustments are necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the TM Document additional discuss

A

staff Training Program , typology reviews and types of monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What may be included in employee training programs in relation to referrals

A

Types of activity that may warrant referrals.

Existence of these referral mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Internal hotlines are also known?

A

Ethics, compliance, or whistleblower hotlines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who does the Internal hotlines help the employees

A

It allows the employee to eport a wide range of activity including employee fraud, harassment and discrimina-
tion, violations of code of conduct, theft of company property, and inappropriate gifts.

17
Q

Can FI retaliate against the person making the report

A

Financial institution is prohibited from retaliating against the person making a report via
the hotline in most jurisdictions and the financial institution must maintain policies, procedures, and
processes to confidentially investigate the information provided through the hotline

18
Q

Do banking regulatory agencies requires subpoenas or search warrants to conduct investigation

A

No , they do not. Rather, their authority to conduct examinations includes
the ability to inspect all books and records of a regulated institution.

19
Q

What is the two independent obligations of FI on receipt of governmental subpoena or search
warrant

A

(1) Legally fulfill the requirements of the subpoena or warrant, and (2) Determine whether the activity
of its customer identified in the subpoena or warrant requires the filing of a STR.

20
Q

Who can issue a Subpoenas

A

Subpoenas are usually issued by grand juries

21
Q

Why are he documents and

testimony required by law enforcement agency

A

These Documents and
testimony are designed to allow the law enforcement agency to investigate suspicious transactions,
develop evidence and, ultimately, put together a case for prosecution.

22
Q

Why will grand juries issue a Subpoenas to FI

A

Subpoenas empower a

law enforcement agency to compel the production of documents and testimony.

23
Q

What may be included along with order to freeze and account or prevent funds from getting withdrawn

A

sworn affidavit

24
Q

In some jurisdictions, freezing orders can also be

executed by seizure warrant. Yes or No

A

Yes

25
Q

Does search warrant also does not compel testimony.

A

No

26
Q

How is search warrant authorized

A

based on information contained in an affidavit submitted by a law enforcement officer.

27
Q

Where should the Privileged records be stored

A

stored in an area (e.g., a cabinet) marked “Attorney-Client Privilege.”

28
Q

What is the alternative in case law enforcement agents want to seize these records

A

the records be given to the court for safekeeping

29
Q

what are the key steps to conduct an effective investigation

A

riewing internal transactions,
identifying and reviewing external information t
contacting business line employees
generating a written report documenting relevant
findings.

30
Q

Steps to betaken basis example on Pg 208

A

a documented review of the customers’ accounts
for one year, including all transactions, KYC information, and social media searches for any
relevant negative media. The report must analyze the information reviewed and determine
whether or not a STR should be filed and any additional remedial measures.